Abstract:
Systeme, Einrichtungen und Verfahren zum Ermöglichen einer Sensorerkennung in autonomen Vorrichtungen hierin. Ein beispielhaftes System zum Ermöglichen einer dynamischen Sensorerkennung mit einem Client, der eine autonome Vorrichtung aufweist. Die autonome Vorrichtung ist in der Lage, unter Verwendung von Sensordaten von einem aktuellen Standort zu einem Zielstandort zu navigieren. Der Client stellt eine Anforderung von Sensorinformationen für Sensoren entlang einer geplanten Route bereit und empfängt jeweilige Sensorinformationen für jeden von einem Satz ausgewählter Sensoren, die von einem Datenserver basierend auf der Anforderung ausgewählt werden. Der Client abonniert einen Datenfeed eines Sensors des Satzes ausgewählter Sensoren entlang der geplanten Route basierend auf Sensorinformationen, die dem Sensor entsprechen, und der Client analysiert den Datenfeed, um zu bestimmen, ob mit der geplanten Route fortgefahren werden soll.
Abstract:
Embodiments for anomaly detection on a web client are generally described herein. A processor on the web client is monitored, where a web browser is installed on the web client, with the web browser arranged to render a web page, the web page including content originating from a plurality of origins. A request from the web page to store data on the web client is intercepted, with the request originating from a particular origin of the plurality of origins. The request is analyzed and approved or denied based on the particular origin.
Abstract:
The invention provides a system for implementing a collaborative phone reputation system, the system comprising a compute device (102) including a call handling module (300) to detect, at the compute device (102), an incoming call for a user of the compute device (102); a scoring module (302) to determine a local probabilistic score that the incoming call is desirable for the user; and an execution module (304) to perform an action at the compute device (102) based on the local probabilistic score. To determine the local probabilistic score, the scoring module (302) is to determine that the incoming call is from a party not in a contact list of the user; and decrease the local probabilistic score based on the determination that the incoming call is from the party not in the contact list; and the incoming call includes an originating phone number; and the scoring module (302) is to obtain a reputation score of the originating phone number; and modify the local probabilistic score based on the reputation score.
Abstract:
Systems and methods may provide for brokering limited access to a service device via an intermediary. In one example, the method may include receiving a request communication at a control device including a request for limited access to a service device, wherein the request is received from an intermediary device on behalf of a request device, and transmitting an access communication to the intermediary device, wherein the access communication includes an access ticket to be used by the request device to gain the limited access of the service device.
Abstract:
Systems and methods for dynamically creating collaborative teams and managing collaborative work of a team are generally disclosed herein. One example embodiment includes the dynamic creation of a collaborative team by creating an association between team members via a managing module. The managing module may be capable of managing, among other things, team members on a team, tasks and goals of each member of the team, as well as documentation associated with the team. In some embodiments, the managing module may use a chat or messaging protocol to manage collaborative modifications to documents of the team.
Abstract:
Systems, apparatus, and methods of authentication utilizing contextual data to authenticate individuals and prevent security breaches are described herein. An example proxy engine may monitor interactions with a computing device to obtain contextual data unique to a user. The contextual data may be utilized to generate unique challenge questions in response to requests for access to a secure resource, and may eliminate the need for a user to remember credentials to access the resource. Challenge questions may be limited to a single use and vary in difficulty in proportion to the value of the resource. In response to correct responses to challenge question(s), the proxy engine may access a vault containing a credential authorizing access to the resource. The vault and proxy engine may be entirely contained on the computing device or they may be implemented on a remote apparatus accessed via an application or interface on the computing device.
Abstract:
Systems and methods may provide for determining a first proximity status of a first mobile device with respect to a vehicle, and determining a second proximity status of a second mobile device with respect to the vehicle. Additionally, an accessibility of one or more functions of the vehicle may be configured based at least in part on the first proximity status and the second proximity status. In one example, a policy associated with one or more of the first mobile device and the second mobile device may be identified, wherein the accessibility is configured further based on the policy.
Abstract:
Embodiments of techniques and systems for sharing user information between proximate devices are described. In embodiments, a first device may identify a physically-proximate device that may receive user information. Upon receiving an indication that a user of the first device may desire to share user information with a user of the second device, a determination may be made as to whether the two users have matching interests. In embodiments, the interest match determination may be made by a separate interest match evaluator. Upon determination of an interest match, the first device may then send a request to share user information to the second device. If a user of the second device approves the request, user information for the user of the first device may be shared with the user of the second device. Other embodiments may be described and claimed.